IT Management  >   Systems Operations  >  

Systems Security

RSS Feed   
Systems Security Reports
 
Secure Hybrid Cloud: The Strategic Approach to Enterprise IT
sponsored by IBM
WHITE PAPER: This 451 Research Pathfinder report was written to help navigate IT and security decision-makers through specific issues related to hybrid cloud security technologies and provides recommendations & considerations throughout the decision-making process. Download the report to get started.
Posted: 31 Jul 2020 | Published: 31 May 2019

IBM

Best Practices for Cloud Data Protection and Key Management
sponsored by Thales
WHITE PAPER: In the era of digital transformation and multi-cloud environments, ensuring the protecting of sensitive data is more important than ever. The following whitepaper highlights cloud data protection best practices, including an in-depth look into cloud native encryption and key management (BYOK, HYOK, RoT & more).
Posted: 05 Aug 2020 | Published: 31 Jul 2020

Thales

SASE For Dummies
sponsored by Cisco Umbrella
EBOOK: Today’s IT teams must securely enable roaming users, devices, and SaaS apps without adding complexity or reducing performance. Likewise, they must develop strategies to protect users from a variety of evolving threats. Read this e-book to examine the changing network and security landscape and steps you can take to keep your organization secure.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
WHITE PAPER: The Secureworks Counter Threat Unit (CTU) regularly conducts research and releases reports related to current developments in threat behaviors and cybersecurity trends. In their most recent Threat Intelligence report, analyze March and April 2020 to discover how COVID-19 shaped the threat landscape, workplace trends, and more.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

Dell SecureWorks

Countering Bots that Attack Your Site
sponsored by Akamai Technologies
RESOURCE: Tap into this article to learn about Akamai’s bot management solutions, such as Bot Manager, and how they offer behavioral-based detections with advanced machine learning to keep your websites secure.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Akamai Technologies

Artificial Intelligence and Cybersecurity For Dummies, IBM Limited Edition
sponsored by IBM
EBOOK: Both AI and cybersecurity are broad and poorly understood fields. This book helps give you an overview of the various technologies that make up AI, where they have come from, and what AI has evolved into today.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

IBM

CipherTrust Cloud Key Manager
sponsored by Thales
PRODUCT OVERVIEW: To meet the recommendations of industry best practices, organizations are offering bring your own key (BYOK) services. However, this level of separation can have significant visibility and security impacts. This solution brief offers a closer look at CipherTrust Cloud Key Manager, which leverages BYOK while offering centralized visibility.
Posted: 05 Aug 2020 | Published: 30 Apr 2020

Thales

Staying Secure in the Cloud While Driving Innovation: Healthcare & Life Sciences
sponsored by DivvyCloud
EGUIDE: In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

DivvyCloud

Remediant Framework Mapping and Assessment
sponsored by Remediant
RESOURCE: The NIST Access Controls framework consists of 23 requirements that should be included in offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.
Posted: 13 Aug 2020 | Published: 28 May 2020

Remediant

Keep Out Vulnerable Third-Party Scripts That Help Steal Data from Your Website
sponsored by Akamai Technologies
RESOURCE: Tap into this article to learn about Akamai’s intelligent edge platform that can detect malicious script activity, protect the integrity of webpages, and safeguard businesses.
Posted: 03 Aug 2020 | Published: 03 Aug 2020

Akamai Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info